summaryrefslogtreecommitdiffstats
path: root/ncr-int.h
diff options
context:
space:
mode:
Diffstat (limited to 'ncr-int.h')
-rw-r--r--ncr-int.h36
1 files changed, 1 insertions, 35 deletions
diff --git a/ncr-int.h b/ncr-int.h
index 764abdb..87964b0 100644
--- a/ncr-int.h
+++ b/ncr-int.h
@@ -58,37 +58,6 @@ struct algo_properties_st {
ncr_key_type_t key_type;
};
-struct session_item_st {
- const struct algo_properties_st *algorithm;
- ncr_crypto_op_t op;
-
- /* contexts for various options.
- * simpler to have them like that than
- * in a union.
- */
- struct cipher_data cipher;
- struct ncr_pk_ctx pk;
- struct hash_data hash;
- /* This is a hack, ideally we'd have a hash algorithm that simply
- outputs its input as a digest. We'd still need to distinguish
- between the hash to identify in the signature and the hash to
- actually use, though. */
- void *transparent_hash;
-
- struct scatterlist *sg;
- struct page **pages;
- unsigned array_size;
- unsigned available_pages;
- struct mutex mem_mutex; /* down when the
- * values above are changed.
- */
-
- struct key_item_st* key;
-
- atomic_t refcnt;
- ncr_session_t desc;
-};
-
struct key_item_st {
/* This object is also not protected from concurrent access.
*/
@@ -144,7 +113,7 @@ int ncr_key_derive(struct ncr_lists *lst, const struct ncr_key_derive *data,
struct nlattr *tb[]);
void ncr_key_clear(struct key_item_st* item);
-int ncr_key_assign_flags(struct key_item_st *item, unsigned int flags);
+int ncr_key_update_flags(struct key_item_st *item, const struct nlattr *nla);
/* key handling */
int ncr_key_init(struct ncr_lists *lst);
@@ -193,9 +162,6 @@ int ncr_key_storage_unwrap(struct ncr_lists *lst,
struct nlattr *tb[]);
/* sessions */
-struct session_item_st* ncr_session_new(struct ncr_lists *lst);
-void _ncr_sessions_item_put( struct session_item_st* item);
-struct session_item_st* ncr_sessions_item_get(struct ncr_lists *lst, ncr_session_t desc);
void ncr_sessions_list_deinit(struct ncr_lists *lst);
int ncr_session_init(struct ncr_lists *lists,